{"id":7775,"date":"2022-05-25T17:58:33","date_gmt":"2022-05-26T00:58:33","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7775"},"modified":"2022-05-25T18:01:08","modified_gmt":"2022-05-26T01:01:08","slug":"1100-it-pros-spotlight-the-security-hazards-of-hybrid-work","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/","title":{"rendered":"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work"},"content":{"rendered":"<p>Today\u2019s cybersecurity challenges are not that much different than from past years, with one slight twist &#8211; the attack surface has dramatically shifted. The pandemic forced us to rethink our IT environment as most users had no choice but to work remotely, relying on their residential internet services. This dramatic shift didn\u2019t give us any time to plan connectivity or security. The result is that every user\u2019s device can become a potential threat. But this blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.<\/p>\n<p>We recently commissioned a survey to understand the global state of security, including the impact of remote workers, was completed with over 1,100 IT and cybersecurity decision-makers and influencers participants, covering 11 countries. The participants also shed some insight into current threats and anticipated investments designed to prevent ransomware and other serious security concerns. Unsurprisingly, the report highlights that moving to a remote work environment contributed to an increase in security incidents, including data loss, ransomware and attacks via cloud services. The result of the survey is a summary of all respondents, as well as multiple regional\/country-specific reports (<a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/new-cyberrisk-alliance-and-infoblox-report-remote-workers-spell-trouble-for-infosec\" target=\"_blank\" rel=\"noopener\"> find them all here<\/a>).<\/p>\n<p>If you take the time to read all of the reports, you will find a commonality of tools most organizations invested in. VPN took the lion&#8217;s share of investments in the past 12 months. However, DDI and DNS technologies are growing in popularity. 41% deployed cloud-managed DDI (DNS, DHCP and IP management) servers as security controls. When hunting down a threat source, 40% relied on network flow data that DDI provides, 39% used DNS queries, and 39% used outside threat intelligence services. <\/p>\n<p>What I also found interesting is how each country diverged in the types of threats or vulnerabilities they were most concerned about in the next 12 months. Here are some examples that bring to life the fact that every region\/country may face a common set of cyber threats; they may differ in the order of importance:<\/p>\n<ul>\n<li>Data leakage &#8211; this was the #1 concern amongst almost all countries surveyed, with an outlier being the US, where \u201cRansomware\u201d made it to the #1 spot.<\/li>\n<li>Ransomware &#8211; this was the #2 concern amongst almost all countries surveyed, with an outlier being the US, where \u201cData leakage\u201d made it to the #2 spot.<\/li>\n<li>Attack via remote worker connections made it to #3 for almost all countries surveyed, with an outlier in the EMEA roll-up, where \u201cDirect attack through cloud services\u201d made it to #3.<\/li>\n<\/ul>\n<p>Another interesting find by comparing each region\/country was with respect to where organizations identified the source of a breach. The following is another sample comparing some of these reports:<\/p>\n<p>WiFi access point &#8211; this was the #1 source of breaches for almost all countries, with an outlier in the EMEA roll-up where Spanish organizations determined that \u201cOther application-based attack\u201d was the #1 source.<br \/>\nCloud infrastructure or application &#8211; was the #2 source of breaches for almost all countries, with an outlier in the EMEA roll-up where Spanish organizations determined that \u201cRemote endpoint (employee-owned)\u201d was the #2 source.<\/p>\n<p>43% of respondents pegged the cost of a breach to $1 million or more.<\/p>\n<p>There are many great examples of how organizations respond to the new workforce environment, with many similarities between regions\/countries. I encourage you to review the report(s) for your country or region. If you are curious, compare it with other regions\/country reports to see how similar or different your environment is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s cybersecurity challenges are not that much different than from past years, with one slight twist &#8211; the attack surface has dramatically shifted. The pandemic forced us to rethink our IT environment as most users had no choice but to work remotely, relying on their residential internet services. This dramatic shift didn\u2019t give us any [&hellip;]<\/p>\n","protected":false},"author":157,"featured_media":7777,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[702,703,464,704,361],"class_list":{"0":"post-7775","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyberrisk","9":"tag-cyberrisk-alliance","10":"tag-remote-workers","11":"tag-global-security","12":"tag-network-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>1,100 IT Pros Spotlight the Security Hazards of Hybrid Work | Infoblox<\/title>\n<meta name=\"description\" content=\"This blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work\" \/>\n<meta property=\"og:description\" content=\"This blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-26T00:58:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-26T01:01:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"588\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anthony James\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/\"},\"author\":{\"name\":\"Anthony James\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7f4b3e7b64203eb67ae699e1a24ccdac\"},\"headline\":\"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work\",\"datePublished\":\"2022-05-26T00:58:33+00:00\",\"dateModified\":\"2022-05-26T01:01:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/\"},\"wordCount\":599,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png\",\"keywords\":[\"Cyberrisk\",\"CyberRisk Alliance\",\"Remote workers\",\"Global security\",\"Network Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/\",\"name\":\"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png\",\"datePublished\":\"2022-05-26T00:58:33+00:00\",\"dateModified\":\"2022-05-26T01:01:08+00:00\",\"description\":\"This blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png\",\"width\":810,\"height\":588},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7f4b3e7b64203eb67ae699e1a24ccdac\",\"name\":\"Anthony James\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_157_1571767262-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_157_1571767262-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_157_1571767262-96x96.jpg\",\"caption\":\"Anthony James\"},\"description\":\"Anthony James is a seasoned technology and marketing executive bringing in 20+ years of marketing and product experience in the cybersecurity industry, Anthony leads as Infoblox\u2019s VP of Product Marketing. He has held multiple executive leadership roles in Marketing and Product Management across a variety of security startups and well-known organizations, including FireEye, Fortinet, Cyphort and TrapX to name a few. With his unique ability to dive deep into technology, he is able to develop messaging and marketing strategies with high value and differentiation, and has a proven track record of increasing market share for companies of all sizes. Anthony holds an associate\u2019s degree in Computer Science from the Sydney Institute of Technology in Australia, where he began his career before migrating to the San Francisco Bay Area in 1999 to drive innovation within the Silicon Valley scene.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/anthony-james\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work | Infoblox","description":"This blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/","og_locale":"en_US","og_type":"article","og_title":"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work","og_description":"This blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/","og_site_name":"Infoblox Blog","article_published_time":"2022-05-26T00:58:33+00:00","article_modified_time":"2022-05-26T01:01:08+00:00","og_image":[{"width":810,"height":588,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png","type":"image\/png"}],"author":"Anthony James","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anthony James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/"},"author":{"name":"Anthony James","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7f4b3e7b64203eb67ae699e1a24ccdac"},"headline":"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work","datePublished":"2022-05-26T00:58:33+00:00","dateModified":"2022-05-26T01:01:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/"},"wordCount":599,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png","keywords":["Cyberrisk","CyberRisk Alliance","Remote workers","Global security","Network Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/","url":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/","name":"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png","datePublished":"2022-05-26T00:58:33+00:00","dateModified":"2022-05-26T01:01:08+00:00","description":"This blog is not another discussion about the perils of working from home; it\u2019s about understanding how this new paradigm affects the security thought process and what organizations have experienced concerning their security posture based on this new normal.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work.png","width":810,"height":588},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"1,100 IT Pros Spotlight the Security Hazards of Hybrid Work"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7f4b3e7b64203eb67ae699e1a24ccdac","name":"Anthony James","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_157_1571767262-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_157_1571767262-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_157_1571767262-96x96.jpg","caption":"Anthony James"},"description":"Anthony James is a seasoned technology and marketing executive bringing in 20+ years of marketing and product experience in the cybersecurity industry, Anthony leads as Infoblox\u2019s VP of Product Marketing. He has held multiple executive leadership roles in Marketing and Product Management across a variety of security startups and well-known organizations, including FireEye, Fortinet, Cyphort and TrapX to name a few. With his unique ability to dive deep into technology, he is able to develop messaging and marketing strategies with high value and differentiation, and has a proven track record of increasing market share for companies of all sizes. Anthony holds an associate\u2019s degree in Computer Science from the Sydney Institute of Technology in Australia, where he began his career before migrating to the San Francisco Bay Area in 1999 to drive innovation within the Silicon Valley scene.","url":"https:\/\/www.infoblox.com\/blog\/author\/anthony-james\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7775"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7775\/revisions"}],"predecessor-version":[{"id":7781,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7775\/revisions\/7781"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7777"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}